Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms

Nora Abdullah Al-gohany, Sultan Almotairi

Abstract

Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data. Unfortunately the increase of the cloud user has been accompanied with a increase in malicious action in the cloud and data not be completely trustworthy. Because of that the cloud computing security become big issue in the cloud data. The danger of malicious in the cloud and the crash of cloud services have received a strong interest by researchers. Here, we present a comparative study between state-of-art approaches to overcome these issues. This paper test and compare between the Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in term of different input size that result the AES is faster than DES in the encryption time but in decryption the DES faster than AES from 20KB to 100 KB after that the DES rise sharply and AES rise slightly that make ASE faster than DES in the decryption time from 120 KB to 300KB. 

 

Full Text:

PDF

References

P. Mahajan and A. Sachdeva, "A Study of Encryption Algorithms AES, DES and RSA for security," Global Journal of Computer Science and Technology, vol. 15, pp. 15-22, 2013.

B. Padmavathi and S. R. Kumari, “A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique,” International Journal of Science and Research (IJSR), vol. 2, no. 4, pp. 170-174, 2013.

A. Verma, P. Guha and S. Mishra, “Comparative Study of Different Cryptographic Algorithms,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), vol. 5, no. 2, pp. 59-63, March - April 2016.

V. Pancholi and B. Patel, “Cryptography: Comparative Studies of Different Symmetric Algorithms,” International Journal of Technology and Science, vol. VI, no. I, pp. 4-7, 2015.

A. Pansotra and S. P. Singh, “Cloud Security Algorithms,” International Journal of Security and Its Applications, vol. 9, no. 10, pp. 353-360, 2015.

N. Bisht and S. Singh, “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms,” International Journal of Innovative Research in Science,Engineering and Technology (IJIRSET), vol. 4, no. 3, pp. 1028-1031, March 2015.

J. Srinivasan and D. Ranjith, “Impact of database security in Cloud Computing,” Proceedings of International Conference on Global Innovations in Technology and Sciences, pp. 263-267, February 2013.

R. Arora and A. Parashar, “Secure User Data in Cloud Computing Using Encryption Algorithms,” International Journal of Engineering Research and Applications (IJERA), vol. 3, no. 4, pp. 1922-1926, Jul- Aug 2013.

R. Kaur and S. Kinger, “Analysis of Security Algorithms in Cloud Computing,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 3, pp. 171-176, March 2014.

G. Devi and P. Kumar, “Cloud Computing: A CRM Service Based on a SeparateEncryption and Decryption using Blowfish algorithm,” International Journal of Computer Trends and Technology, vol. 3, no. 4, pp. 592-596, 2012.

O. Jasim, S. Abbas and E.-S. El-Horbaty, “Efficiency of Modern Encryption Algorithms in Cloud Computing,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), vol. 2, no. 6, pp. 270-274, December 2013.

M. Patwal and T. Mittal, “A Survey of Cryptographic based Security Algorithms for Cloud Computing,” HCTL Open International Journal of Technology Innovations and esearch, vol. 8, pp. 1-17, March 2014.

N. Jain, P. Jain and N. Kapil, “Enhanced data security model for cloud using ECC algorithm and third party auditor,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 5, no. 3, pp. 519-524, March 2016.

S. S. Khan and R. R. Tuteja, “Security in Cloud Computing using Cryptographic Algorithms,” International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), vol. 3, no. 1, pp. 148-154, January 2015.

Wadday, Ahmed & Wadi, Salim & J Mohammed, Hayder & A Abdullah, Ali. (2018). “Study of WiMAX Based Communication Channel Effects on the Ciphered Image Using MAES Algorithm.”

Yang, X.; Hou, Y.; Ma, J.; He, H. CDSP: A Solution for Privacy and Security of Multimedia Information Processing in Industrial Big Data and Internet of Things. Sensors 2019, 19, 556.

Refbacks

  • There are currently no refbacks.